June 25, 2018 By Sandra Hernandez
Tom Obremski
2 min read

Companies today face heightened scrutiny when it comes to the handling and use of personal data. We often see it in the news and through recent compliance mandates, such as the General Data Protection Regulation (GDPR), which affects not only companies located in Europe, but any organization that handles information belonging to data subjects from the European Union (EU).

Unfortunately, many companies lack insight into all the ways they capture, use and share sensitive data. This insight could include where data moves or when it might cross international borders.

At every step — from capturing personal data or storing it in a database to accessing it across various lines of business and sharing it with business partners — the movement of data, combined with deep network visibility, allows organizations to gain the insights they need to protect sensitive data, manage its use and maintain compliance.

Listen to the podcast: 5 Data Types to Consider When Conducting a Risk Assessment

Case Study: Retailers Face New Data Privacy Challenges

Let’s look at the retail industry, for example. Smart retail brands are discovering that different media and transactional channels work in harmony to help make their brands more relevant and drive sales. Companies in the retail industry process a huge volume of credit and debit card transactions, but these transactions often capture other personal information as well. Whether it’s loyalty cards, email addresses, clothing sizes or other data retailers use to detect buying patterns, there is a wealth of information that is collected, stored, processed and shared across many stores, data centers and business partners. The value of this information makes these organizations a prime target for attackers and puts critical data at risk.

Protecting personal data requires knowing what data is being used within your organization, who is accessing it and how it moves across the organization (and even geographic borders). Companies spend a tremendous amount of time and effort to protect data that is known, but we ultimately need to ensure that all personal data is protected and used properly.

In addition to losing brand reputation and client trust in the event of a breach, retailers can now be held financially accountable for the improper handling of personal information because of GDPR. Companies must be able to demonstrate that they have incorporated privacy and security considerations into their systems, services and products by default.

A Little Network Visibility Goes a Long Way

Security intelligence platforms are designed to help organizations easily detect sensitive data through network visibility, identify potential risks and quickly alert security teams to suspicious activities that may signal an attempt at data theft. By investing in solutions that analyze network traffic in real-time, organizations can more capably detect new assets and identify sensitive data in its application context as it moves from one location to another. These tools can also prioritize risks and vulnerabilities based on where data is stored.

Companies in all industries can protect against data compromise by continuously monitoring content as it traverses the network. These insights enable security leaders to properly manage sensitive data and prepare for new and emerging compliance regulations.

Whether you are a retailer, financial institution, utility, government organization or manufacturer, we all depend on large volumes of personal information to ensure the success of our customers and organizations. Protecting this information — and treating it responsibly — starts with knowing where your sensitive data is, where it comes from and where it is going.

Read the Analyst Report: QRadar Network Insights Delivers Real-Time Insights

More from Network

Databases beware: Abusing Microsoft SQL Server with SQLRecon

20 min read - Over the course of my career, I’ve had the privileged opportunity to peek behind the veil of some of the largest organizations in the world. In my experience, most industry verticals rely on enterprise Windows networks. In fact, I can count on one hand the number of times I have seen a decentralized zero-trust network, enterprise Linux, macOS network, or Active Directory alternative (FreeIPA). As I navigate my way through these large and often complex enterprise networks, it is common…

Easy configuration fixes can protect your server from attack

4 min read - In March 2023, data on more than 56,000 people — including Social Security numbers and other personal information — was stolen in the D.C. Health Benefit Exchange Authority breach. The online health insurance marketplace hack exposed the personal details of Congress members, their families, staff and tens of thousands of other Washington-area residents. It appears the D.C. breach was due to “human error”, according to a recent report. Apparently, a computer server was misconfigured to allow access to data without proper…

X-Force identifies vulnerability in IoT platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

Cybersecurity in the next-generation space age, pt. 4: New space future development and challenges

4 min read - View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today